Showing posts with label TCG digital forensics. Show all posts
Showing posts with label TCG digital forensics. Show all posts

Monday, 6 January 2020

What is in your event cybersecurity strategy


Open source intelligence is an area that is often overlooked and widely misunderstood. It is also known as OSINT as part of the overall event cybersecurity strategy.

 You need to target your own organization to find loop holes and see where or how you could be attacked. You are able to identify the information leaking out of your vendor’s connections to your data or through your own technology before they get to you 1st.

Image result for cybersecurity strategy

Digitally, you can use OSINT tools to identify everything you can about the technology and people that work at your organization as well as use it to see if your sensitive data has leaked online. Trust me, if its digital it is worth taking as many assets are valuable. But here are the top 3.

Finding the schedules of notable people and their security details assignments

Being able to spoof or fake credentials online or in a person.

Stealing personally identifiable information. PII.

Cybercriminals are just like bank robbers in the old days the follow the money. That is why in this day and age, if you are running a large public event that draws thousands of people, whether it be at the state, national or local level, you need to be as vigilant about protecting data as any business. Otherwise, you will lose your customers.

Image result for cybersecurity strategy

So, whose job is it to check if it’s safe? You are defiantly not going to like the answer. It’s your job to protect the traffic and its contents as confidential and sensitive. It is also your job to have a security plan that is both digital and physical. Fundamentally, you cannot assume that safety is someone else’s job. 

You can always check in with us on 0211100422 or www.tcgforensics.co.za 

Friday, 13 December 2019

7 steps to good digital parenting


Parenting today’s tech savvy kids can seem overwhelming, but you can do it! Take these seven simple, but still challenging steps, to becoming a good digital parent.

Yes when they are small we all have a hand on things. But as they get big it becomes more difficult to keep an eye out for things and so much can go wrong. Scams, hacking, kidnapping and so much 
more.

Image result for digital parenting

Talk with your kids

Educate yourself

Use parental controls

Set ground rules and enforce consequences

Friend and follow but don’t stalk

Explore, share, and celebrate

Be a good digital role model

Image result for digital parenting

Talk early and often be open and direct and always stay calm. Always try and search online for anything that you do not understand and try out some apps, games and sites yourself. Discuss and sign a family safety agreement so that the bond is already there. Restrict where and when they may use the device and that way boundaries will be set. If a rule is broken remove the tech privileges and do try and stick to them.

Follow your kids on social media but also respect their online space and freedom, try not to flood their accounts with comments and likes. Go online with your kids and explore their digital world, share your own online experiences and learn from each other and have some fun!

Get in contact with us on 0211100422 or www.tcgforensics.co.za

Thursday, 12 December 2019

Romance Scammers


What you need to know about Romance Scams. In this day and age lots of people are turning to online dating apps or social networking sites to meet someone. But instead of finding romance, many find a scammer trying to trick them into sending money.

The romance scams was 1 of the biggest reported losses over any other scams that was reported. Romance scammers create fake profiles on dates sites and apps, or they will target and contact through popular social media sites like Facebook, Instagram extra.

Here are just some of the lies they would tell you.

I am working on an oil rig
I am in the military
I am a doctor with an international organization

Here are some ways they will ask you for money and target you to send it to them and will ask you to wire the money or send it in a gift card.

Pay for a plane ticket
Pay for surgery
Pay for a visa or other official travel document

Image result for Romance scammers

Scammers ask you to pay by wiring money, with reload card, or with gift cards because they can get cash quickly and remain anonymous. They also know the transactions are almost impossible to reverse. Avoid losing money to a romance scammer and here is how.

Stop communication immediately
Talk to someone you trust about what is going on and get some advice
Do a search for the person job, profile, family or friends and ask questions re that
Do a reverse image search of the person profile picture

If you have any feeling this is a scammer or an uncertain feeling report it. Do not get yourself caught up losing money and braking your heart!

Contact us on 0211100422 or Email contact@osint.co.za 

Wednesday, 11 September 2019

What’s doable in an Audio Investigation?

Audio forensics and investigations are defined as the field of digital forensics that is related to the acquisition, analysis, and evaluation of sound recordings. The results of an audio investigation are usually presented as evidence in court cases, whether they come from a criminal investigation or part of an official inquiry.


We spoke to Sound Engineer, Kiana Schulla Pronk, to find out all there is to know about what is doable in an audio investigation.

I was born and raised in Cape Town, South Africa. After becoming involved in the music scene in my high school years, I attended City Varsity School of Media and Creative Arts in Cape Town (CBD) 2016 - 2017. I completed a 2-year Diploma in Sound Engineering and graduated in March of 2018.

This institution had the resources to train us and give us the tools to become an expert in the field that we study, to which I chose Sound Engineering. For 2 years, I studied full time and underwent training to become an Audio Engineer.

Within the two years of studying at this institution. We learned the basics of the broad spectrum, categorising it into a few sectors – all with sound-based, but different processes. Our different categories would differ between Live Sound (concerts), Film Audio Engineer, Mastering and Production, Composition and Post Production.

Where I felt my strengths were was in the post-production sector, analysing audio, as well as cleaning ‘noisy’ audio as well as the Sound Design sector.

I am proficient in DAW Systems such as Pro Tools, Cubase and Reason Rewire. Frequency hearing tests and analysing sound on various frequencies were part of my training.  

Since the year 2018, I have been assisting various companies with audio analysis, identification, and comparison. Additionally, I have been doing my training with the company TCG Digital Forensics and educating myself with software systems such as Praat & Diamond Cut Forensics Audio Lab to assist in finding, analysing and recording evidence that is relevant to a case.

In analysing Audio with the above-mentioned software, we have the tools to:

Forensics Audio Authentication, Voice-Printing & Formant Analysis
File Transcription / Time Expansion / Speed and/or Pitch Change
Audio Restoration & Enhancement
Audio Editing & Voice Garbling / Voice Disguising
Audio & Acoustical Measurements
Audio File Format Conversions
Statistical Measurement Tools


Any piece of audio recording can be looked at and with the information on how the audio piece is recorded, can already give investigators hints/tip offs in disciplinary hearings or official court cases.

I am currently rendering services to: 

Company Name: TCG Digital Forensics (Craig Pedersen)
Location: 32 Woodbridge Business park, 452 Koeberg Road, Milnerton, 7441
Tel: +27 21 110 0422 | Mobile: +27 79 691 0138
Email: contact@tcgforensics.co.za
Website:  www.tcgforensics.co.za  

Company Name: TSU International – K&E Division (Adv Herman Bosman)
Location: 17 Main Road, Strand, 7140
Tel: +27 21 492 5951 / Mobile: +27 82 857 6096
Email: k.e1@tsuint.com
Website:  www.tsuint.com

Wednesday, 3 July 2019

Top 8 things you should be doing in regards to Internet Security!

We do everything online these days! Our cell phones, laptops and PCs are basically an extension of ourselves, that is why being extra careful when it comes to internet security is so important.


It is so surprising that people still do not bother with their internet security – you are not invisible, as soon as you go online you become a possible victim of so many things including scams, fraud, identity theft and so much more.

One of the safest methods to follow is to purchase a high quality internet security software that will have regular updates, remove viruses, scan on a regular basis and notify you of malicious activities.

- Keep your passwords security and don’t share with anyone

- Install and update security software on your PC and cell phone

- Be wary of phone calls asking for personal information or access to your PC

- Do not post financial or personal information on social media networks

- Be extra careful when buying online and also use a safe payment method

- Protect your cell phone from malware and viruses just as you would your PC

- Double check bank accounts and statements for anything suspicious

- Talk with your family and friends and encourage them to report anything unusual!

Always remember it is not a matter of IF you will become a victim, it is a matter of WHEN! Take into consideration the things you should be doing to make sure you are secure online.

Are you scared you’ve become the next victim? Please contact TCG Digital Forensics as soon as possible and we will do what we can to assist you! Call us on 021 110 0422 or email contact@tcgforensics.co.za | Learn more here www.tcgforensics.co.za or www.osint.co.za

Wednesday, 20 March 2019

CFE Services in South Africa


As the business world and the online continues to grow so does fraud. And with the growth of digitization comes more ways for fraudsters to find possible victims! 

Related image

There are a range of different and somewhat scary fraud trends that business owners as well as individuals should keep their eyes open for. Fortunately with the growth of fraud comes the growth of professional and reliable CFE Services in South Africa.

TCG Digital Forensics in South Africa offers a range of unique expertise in the CFE field. In order for your company to be aware of fraud and prevent it in the future without harming your organisation as well as your employees and clients, CFE (Certified Fraud Examiners) provide digital forensic services where they will assist in detecting, preventing and investigating the situation.

We offer CFE services in South Africa that can protect and assist you as an individual as well as your business, overall our digital forensics services are there to strengthen your anti-fraud protection efforts.

NEVER let fraudsters try and damage your business, make sure to take the right steps and communicate with the right people involved in CFE in South Africa. Here are some fraud trends to keep an eye out for…

- Identity theft
- Fake accounts
- Machine learning

Fraud continues to grow at a rapid rate, which is why you need to keep up with the trends! Contact TCG Digital Forensics for reliable, professional and effective CFE services in South Africa.


For more information about our digital forensic services in South Africa, please do not hesitate to contact TCG Digital Forensics directly on 021 110 0422 or email contact@tcgforensics.co.za

Wednesday, 6 February 2019

All you need to know about Digital Forensics and Information Security


Before we get into the differences between digital forensics and information security, let’s stop and take a look at how they are alike.

Related image

Both digital forensics and information security are aimed at protecting your digital data, goods and valuables as well as digital resources. People who are involved in digital forensics or information security can work in a range of industries, including private businesses and organisations. Why can people in the digital forensics and information security work in so many different industries?  Because, companies know that as the world becomes more digitally dependant so does the need to keep their technology and systems properly secured. Digital forensics and information security specialists are becoming more and more popular as the demand for their skillset grows.

But, just because digital forensics and information security are both focused on digital goods and resources doesn’t mean the two are both closely associated with each other doesn’t mean they are the same.

It is best to think of digital forensics and information security as two different sides of the same thing, so the services and work that is done is very much the same, but it does have differences.

So what is the difference between digital forensics and information security? To put it into simple terms that everyone can understand, information security is about preventing and protecting against online and digital threats. On the other hand digital forensics is about the response that comes after.

Let’s look at it like this – information security is the team that executes and supports the information security system with the aim being to protect individuals and businesses against cyber threats. If information security fails to protect the users and the systems are broken, then this is where the digital forensics experts come into the picture – they will put their skills to use by singling out the threat, understanding it and trying to recover all the data that was lost and/or stolen.


At TCG Digital Forensics, we offer all our clients clean, professional and affordable digital forensics services as well as information security – all supplied by our team of skilled digital forensics experts. Do not hesitate to contact us to discuss your requirements; simply give us a call on 021 110 0422 or email contact@tcgforensics.co.za

Friday, 7 December 2018

The latest Digital Fraud Investigation trends to look out for...

When it comes to the business world, being prepared for the future is key. But what digital fraud investigation trends do we have to keep our eyes open for in the future? 

Image result for Digital Fraud Investigation

At TCG Digital Forensics, our Certified Fraud Examiners offer digital fraud investigations using a unique set of expertise in detecting, preventing and then investigating fraud – allowing your business to uncover fraud sooner and avoid losses that can negatively affect your organization. No organisation is completely safe from fraud and the damage that it can cause. From large corporations to small family-run businesses, fraud is often inescapable, resulting in a devastating outcome.

Our CFEs offer digital fraud investigations in South Africa that can protect you, your organisation and strengthen your overall anti-fraud efforts. We offer a range of digital forensics services including digital fraud investigations in South Africa which can protect you, your organisation and strengthen your overall anti-fraud efforts.

Do not let the fraudsters damage your company or business in the years to come, here are the latest digital fraud investigations trends to look out for…

Identity theft will evolve – It’s nothing new to digital fraud investigations, but identity theft fraud will take new and more sophisticated steps to steal your private information and data.

Rapid growth of fake accounts – From internet trolls to fake news, there is always an overflow of fake accounts, but as tech grows rapidly so will the creation of sham accounts

Fraud detection and machine learning – Fraudsters will continue the trend of focusing on popular industries including travel, tech and fashion, meaning digital fraud investigations will be on the rise.

As you’ve seen will regards to the digital fraud investigations above, with new technology advancing at a rapid rate, so will the digital fraud investigation trends.

Tuesday, 4 December 2018

Let us recover your Digital Evidence quickly and easily!


People use their computers for almost everything; many of these things can be used against you. Hiding money, illegal activities, inappropriate emails and just about anything you can think of.

Image result for digital evidence

Often, if you are trying to hide something, you’ll make an effort to completely clean out your computer by deleting “everything” and reformatting. The problem is, when you contact IT support and you are told that all is lost, they probably have no idea what a digital forensic investigator can do!

The harsh truth is that the evidence is still there waiting to be found you just can’t see it. The only question is – do you want it recovered or not?

Many businesses that have a disgruntled employee, or feel that an employee is involved in unacceptable activities at work, may want to acquire some digital evidence, they can use a digital forensic investigator to recover all the evidence that they need.

We at TCG Digital Forensics are pleased to provide all the evidence that you need off of a computer, cellular device, laptop or tablet. The obvious advantage that we have here is that we recover digital evidence that few others could and keep all affairs private.

Need something recovered? Don’t hesitate to give us a call on 087 001 0523 or email contact@tcgforensics.co.za

Wednesday, 11 July 2018

What is a Due Diligence Investigation & why should one be conducted?


A due diligence investigation needs to be conducted to assess the qualifications and track records of the people involved in a certain business transaction. This type of investigation needs to identify or reveal if there are any potential inconsistencies, misrepresentations, omissions or controversies.

Related image

So – why should a due diligence investigation be conducted?

Any business that is involved with IPO’s, mergers, acquisitions, joint venture, partnership deals and other business situations, should always contact an expert to discuss certain needs and assist in a professional due diligence investigation. At the TCG Digital Forensic Division in Cape Town, we offer all forms of digital forensic services, including due diligence investigations – do not hesitate to give us a call on 087 001 0523 or email contact@tcgforensics.co.za if you wish to have a confidential discussion around your particular requirements.

Our digital forensic services can bring to your attention any past dealings and behaviour which can give you an inside look into what you can expect from your business dealings in the future.

Here are some of the most important benefits of due diligence investigations….

> Reduced risk
> Minimised possible embarrassing situations
> Complete peace of mind
> Ensured reliability
> No hidden surprises
> It is a vital part of your business practice

Related image

If you fail to do a due diligence investigation, you may be inviting certain issues and even business disasters – get your due diligence investigation done and you will be able to spot and eliminate the problems.

Wednesday, 4 July 2018

Why you should use professional forensic image enhancement services

Imagine a crime happens and your CCTV cameras catch the entire scenario, the only problem is that the video or images are not of high enough quality to show the criminals face or the vehicle registration number.

Image result for image enhancement

If there are no good frames available that means that case will go unsolved.

However, digital forensic experts often have the means and the correct specialized software to digitally enhance an image and aid in solving the case.

Our TCG digital forensics team are able to provide static image enhancement as well as digital video enhancements. Please bear in mind that results are most often dependant on the quality of the original image and we will require the highest resolution output that you are able to deliver before we can assess what the enhancement potential will be.

Related image

While we would dearly love to provide a “CSI” type service where the smallest reflection in someone’s sunglasses reveals a crystal clear image of a suspect – this is limited to what we term “the elusive Hollywood” computer system.

We will gladly review your image(s) at our Cape Town or Pretoria offices and offer you a no-charge assessment of how much adaptive work can be done with the images you have available. From that point we will be able to offer an estimate of costs. Contact TCG Forensics on 087 001 0523 or email contact@tcgforensics.co.za

Wednesday, 13 June 2018

4 Important Steps to take if you’ve been Hacked!


Have you ever been hacked? Whether you are an individual or a business owner, getting hacked is a terrible experience that can cost you time, money and possibly destroy your business.

Image result for hacked

Hackers can get away with a lot of things, including stealing your sensitive data and your money. This data, whether it is your personal information and passwords or your customer’s private records can be used to target you in future attacks.

Here’s what you can do to recover from a hack…

Contact Customer Services. If the hack is on your Facebook, Twitter, Instagram, etc. profile be sure to contact their customer services as soon as you possibly can. Social networking companies are getting more efficient at cracking down on stolen accounts, so they should be able to help you fairly quickly.

Scan your System. If you manage to get your account under control, always check your entire system as well for suspicious files or strange behaviour. Simply fixing your Facebook profile page doesn’t mean all your other data hasn’t been affected. Always go through your entire system, this includes your emails, online banking, apps, etc.

Do the Basics right. If you’ve been the victim of an attack, you need to make sure you do through all the basics and get them right.

-- Change your passwords on a regular basis and always use a different passwords
-- Use two-factor authentication
-- Install a trusted anti-virus software
-- Patch and update your software on a regular basis
-- Back up your data
-- Be wary of putting too much personal information on your social media accounts

Contact the Professionals. If all else fails and the hack is too much for you to recover from on your own – always contact the professionals before you do anything else that may damage your system even more. While most companies have in-house and contracted skills to manage and administer their network, it’s not uncommon that outside specialist skills are needed to recover from a serious breach. Contact the TCG Digital Forensics team for quick, reliable and affordable hacking recovery.

When you have been hacked you may feel that you have lost a lot more than just your data, you’ll feel embarrassed and the business you’ve put so much time and money into may be compromised. Get your dignity back by using these 4 important steps!

Wednesday, 9 May 2018

Do you know the History of Digital Forensics?

Before the 1980s, crimes involving computers and digital devices were dealt with using existing laws. So, the field of digital forensics is relatively new. While its history may be short, it is quite complex.

Image result for old computer typing

As the years went by, the range of digital crimes being committed increased, but it was not until the 1980s that federal laws began to include computer offences. Canada was actually the first country to pass legislation in 1983, followed by the US Federal Computer Fraud and Abuse Act in 1986.

The fact that computer and digital crimes grew so much during the 1980s and the 1990s caused law enforcement agencies to start making specilised groups to deal with the technical aspects of the investigation. For example, the Computer Analysis and Response Team that the FBI formed in 1984.

Throughout the 1990s there was a high demand for these new investigative resources, this lead to the creation of regional and even local level groups to help handle the load. But, it was not until 1992 that the term “computer forensics” was actually used in academic literature.

Since the year 2000, a lot of people and agencies have written and published guidelines for digital forensics. A European lead international treaty, the Convention on Cyber crime, came into force in 2004 with the aim of reconciling national computer crime laws, investigative techniques and international co-operation.

Image result for digital forensicsThe issue of training also received some attention. Companies, such as forensic software developers, began to offer certification programs, and digital forensic analysis was included as a topic at the UK specialist investigator training facility.

Since the late 1990s digital devices have become available everywhere, basically everyone has a phone or some kind of digital device. Devices have advanced way beyond simply communicating, they are great forms of information, even for crime not usually associated with digital forensics. However, digital analysis of phones has lagged behind traditional computer media, mostly because of problems over the ownership of the devices.

The complex field of digital forensics will always have unresolved issues. Many issues will include; increasing size of digital media, the wide availability of encryption to basically everyone, the variety of operating systems, increasing number of people owning multiple devices and lets not forget the legal limitations on investigators.

The TCG Digital Forensics Division is based in Cape Town and combines the experience digital forensic seasoned investigators with the latest technologies to achieve the results that you require! We do all forms of Digital Forensics such as Cyber Forensics (Penetration Testing / Hacking Recovery / Cyber Investigations), Cellular Phone Analysis, Hard Drive Analysis, Device Acquisitions and Due Diligence Investigations.

Wednesday, 25 April 2018

What can you do to keep your Broken Phone’s Data Safe?


Only you know how valuable the data on your mobile phone is, what you do with the information is up to you. So, do you know how to keep your personal data safe on your phone when it suddenly breaks?

Image result for cracked phone

The answer isn’t a simple one – how do you use your phone when the screen is cracked? It happens a lot more often than you think. The question is what do you do to protect your data when you can’t use your phone properly?

Here are a few things you can do to make it difficult for anyone without professional forensic skills to get to your stuff…

      1.       Use a secure lock screen – Swiping to unlock is easy enough for a monkey to do, so make sure you always lock it properly!

      2.       Set up Find My Device – Install Find My iPhone on your iPhone or Find My Device on your Android from Google Play Protect. Even if you can’t use the phone you can still access the data.

      3.       Change your Password – Use another device to change your Google password, this extra step will stop anyone from accessing your data and ensuring damage is minimal.

      4.       You may need to speak to a Professional – If you feel your data is precious enough to stress over, then you need to hire someone such as a professional digital forensic expert to assist you in retrieving or destroying it.

Related image

Looking for both cellular and computer forensics services? TCG Forensics is a digital forensics company in South Africa that is always at your service. We generally work directly for private investigators, polygraph examiners, attorneys and similar parties although we can accept a direct brief from a corporate entity that requires our services. We are able to assist bona fide law enforcement agencies with the procurement of forensic software and hardware once credentials have been verified.

Wednesday, 7 February 2018

Smartphone Safety for Children

It’s 2018, we’re more connected than we were a few years ago and we’re continuing to grow as time goes by.

Related image

These days, teenagers and even small children are getting caught up in all the new technology that is being introduced. The ability to communicate with friends with the push of a button is a sought after thing, and having a smartphone is a privilege that all teenagers assume they should have. However smartphones can bring a few dangers with them.

It’s about time you sit down with your children and have a chat with them about smartphone safety…

You will never be able to remove them completely from the world of technology, so make sure to sit down and have an educational conversation instead of arguing with them.

Who are they talking to? Are they chatting to their friends or someone they met online? Let them know that people are usually not who they seem to be online and they should apply “stranger danger” online as well as in the street.

What kind of content are they looking at? Are the apps, games, videos, etc. they’re looking at appropriate for their age? Remember to be aware of any cyberbullying is taking place.

Are they texting and driving? Texting and driving is beyond dangerous, especially for young teens who have just started driving and have little experience. There are apps you have use to control this, but there should be strict rules in place too.

Related image


Do you have any questions about smartphone safety or cellular forensics? At TCG Digital Forensics, we offer a range of services, from cyber forensics and mobile phone analysis to image enhancements and suspect profiling. Contact us on 087 001 0523 or contact@tcgforensics.co.za

Wednesday, 24 January 2018

How to know if your Phone has been Hacked

Are you worried that someone might have hacked into your cell phone? Don’t worry you’re not alone! There are hackers all over the world who are looking to hack into your phone and invade your privacy.

Related image

If you suspect that your phone has been hacked, here’s how to check…

  • Your battery is going dead a lot quicker than usual
  • Your phone always feels warm
  • You are going through a lot of data lately
  • There are pop-up notifications everywhere
  • Unauthorized purchases on your credit card or posts on Facebook or Twitter
  • Your phone shutdowns for no reason
  • You’re having issues with echoing during calls


Here’s how to avoid contracting spyware…

  • Don’t click on strange links
  • Lock your phone at all times and use a PIN
  • Only download apps from secure sources
  • Be careful when buying a second-hand phone

Your cell phone is the perfect spying device – it allows hackers to listen, track and view everything you do without you realising it.

Related image

Remove all traces of any spyware or malware from your cell phone with our affordable, effective cell phone debugging services. Contact TCG Digital Forensics and secure your cell phone today. Email contact@tcgforensics.co.za or call 087 001 0523 | 087 001 0511/2

Thursday, 11 January 2018

The most important skills you need for a career in Digital Forensics

Tech meets criminal justice in the field of digital forensics--a branch of forensic science dealing with recovering and analyzing information from data storage devices (including computers, phones, networks, and more). Digital forensics examiners help track down hackers, recover stolen data, follow computer attacks back to their source, and aid in other types of investigations involving computers.

Image result for digital forensics

Want to know what it takes to become a digital forensics examiner? Here are some key skills needed for the career…

Analytical talent: It stands to reason that anyone in an investigative role needs to have the analytical skills required to piece together information and solve the case. Cyber security expert, Ondrej Krehel says: “High speed of analytical thinking, and precise observation skills, which are often gained and tested at high tech military and intelligence cyber units are also important skills to have." The ability to find patterns and make correlations is crucial in the investigation process!

Computer science/tech skills: Since digital forensics is such a technical field, it helps to come from a background studying or working with computer science. An important quality of any great digital forensics investigator is a deep understanding of how technology really works. If you have experience with computer systems, programming, or other related fields, this will help you transition into digital forensics since you will already have a general knowledge of how technology and networks work, how digital systems interact with each other, and what is possible from a compromise perspective.

Understanding of cybersecurity: The field of digital forensics is all about solving cybercrimes--and who has a better knowledge of those than cybersecurity professionals? It's impossible to guard against data breaches without knowing the techniques being used to target systems, and this same knowledge that helps to prevent crimes also is useful in solving them. Many of the most talented forensics examiners will have had experience working on a cybersecurity team.

Related image

Organisation: You can have a messy desk and be a great digital forensics examiner--but mental organisation is a must, as is organised record-keeping. Being extremely organised and thorough is a must! Documentation of your findings is necessary as it is often required to present them to others such as attorneys and judges.

Communication skills: In relation to the above point, digital forensics doesn't exist in a vacuum. The team you work with and people you work for need to know what's going on, meaning that you need to communicate it to them. According to Ondrej Krehel, "Having both strong writing and speaking skills is extremely important to effectively communicate your findings to other team members and your clients."

Desire to learn: Cybercrime is constantly evolving, so it's a must to keep your knowledge up-to-date and always seek out ways to be better at your job. To be a digital forensics examiner, you must have great pride to be one of the best in what you do. Self-critique skills for constant improvement of your work is a very desired trait!

As for higher education, degrees are helpful in breaking into the digital forensics field, but what really establishes someone's credentials is the product of their work and the ability to conduct digital forensics in very detail-oriented manner!
At TCG Digital Forensics, we do all forms of Digital Forensics such as Cyber Forensics (Penetration Testing / Hacking Recovery / Cyber Investigations), Cellular Phone Analysis, Hard Drive Analysis, Device Acquisitions and Due Diligence Investigations.

Wednesday, 22 November 2017

We can recover Computer Evidence quickly and easily!

People use their computers for almost everything; many of these things can be used against you. Hiding money, illegal activities, inappropriate emails and just about anything you can think of.

Often, if you are trying to hide something, you’ll make an effort to completely clean out your computer by deleting “everything” and reformatting. The problem is, when you contact IT support and you are told that all is lost, they probably have no idea what a digital forensic investigator can do!

Image result for digital forensics

The harsh truth is that the evidence is still there, waiting to be found, you just can’t see it. The only question is, do you want it recovered or not.

Many businesses that have a disgruntled employee, or feel that an employee is involved in unacceptable activities at work, may want to acquire some digital evidence, they can use a digital forensic investigator to recover all the evidence that they need.

At the TCG Digital Forensics Division, we are pleased to provide all the evidence that you need off of a computer, cellular device, laptop or tablet. The obvious advantage that we have is that we recover digital evidence that few others could and keep all affairs private!

Need something recovered? Don’t hesitate to give us a call on 079 691 0138 or email craig@tcgforensics.co.za


Wednesday, 11 October 2017

What is Mobile Phone Analysis?

As mobile devices become more and more dominant in our lives, the opportunity to store and circulate information is more possible than ever.

Image result for holding mobile phone

Mobile devices have many different features, like the ability to take photos and videos. When a multimedia file is taken, many devices automatically embed GPS location of the handset at that time. This then allows the location of the user at that exact moment to be established at a later date.

Multiple communication features, such as Bluetooth, WiFi 3G and 4G enable the transfer of information that can even cross international boundaries. Users can browse the internet, send and receive emails, post blogs and even removable media cards can be inserted into the device allowing information to be exchanged.

Depending on the client, the following information can be recovered from a mobile phone:
  • SMS
  • Email
  • Call history
  • Photos
  • Videos
  • WhatsApp history
  • Passwords

Mobile devices are similar to computers, but with far more powerful capabilities. The value of the evidence found on a smartphone or any other mobile device must never be overlooked! The TCG Forensic Division has the cellular and digital expertise to extract and uncover the evidence you need. 

Wednesday, 27 September 2017

Spotting a Cybercriminal

When someone says “cybercriminal” the first image that pops into your mind is probably a teen / young adult male who is a wizard on the computer, but struggles to have a healthy social life.

Related image

BUT, this is just a typical stereotype! Our digital forensic experts from TCG Digital Forensics have provided some facts and stats about the average cybercriminal and how to spot them…

       ·         Over half of the world’s internet users have been the victim of cybercrime at least once.
       ·         Every single day more than 105 million people are victims to cybercrime.

Who are these cybercriminals?
Age:

43% – 35+ years old
29% – Under 25 years old
11% – 50+ years old
8% – 14 to 18 years old

Gender:

76% – MALE

Work in Groups:

25% of active cybercriminal groups have been operating for 6 months or less
50% cybercriminals have 6 or more members

Related image

Location:

North & South America – 19% of global attack traffic
Europe – 28% of global attack traffic
APAC – More than 49% of global attack traffic
Indonesia – Highest in APAC with 14%

Organised Crime:

       ·         Cybercrime has morphed into fully-fledged businesses with executives, managers and workers
       ·         Underground chat rooms, market places, hired hackers, other illegal information, etc. – all these support the cybercrime businesses
       ·         Invitation-only, help wanted portals specifically for cyber criminals, most originating from Russia.

We can’t stop cyber criminals from attempting their crimes, but we can stop them from getting our identities and precious information online! If you have the feeling that you may be the victim of a cybercrime, do not hesitate to contact us at the TCG Forensic Division on 079 691 0138 or email craig@tcgforensics.co.za